Unlocking Security The World of Ethical Hacking
Unlocking Security The World of Ethical Hacking
net/publication/377343329
Article in International Journal of Scientific Research in Science Engineering and Technology · January 2024
DOI: 10.32628/IJSRSET2310666
CITATIONS READS
0 162
4 authors, including:
All content following this page was uploaded by Darshanaben Dipakkumar Pandya on 06 July 2024.
ARTICLEINFO ABSTRACT
Article History : As nowadays all the information is available online, a large number of
users are accessing it, some of them use this information for gaining
Accepted: 01 Jan 2024
knowledge and some use it to know how to use this information to destroy
Published: 10 Jan 2024
or steal the data of websites or databases without the knowledge of the
owner. The purpose of this paper is to tell what is hacking, who is hackers,
what is ethical hacking, what is the code of conduct of ethical hackers and
Publication Issue :
the need of them. A small introduction of Linux Operating System is given
Volume 11, Issue 1
in this paper. All the techniques are performed on the Linux operating
January-February-2024
system named Kali Linux. After this some basic hacking attacks covered in
the paper are MiTM Attack (Man in The Middle Attack), Phishing Attack,
Page Number :
DoS Attack (Denial of Services Attack). Further what is Wi-Fi, what are
41-45
the techniques used in the Wi-Fi protection and the methods used by the
hackers to hacks Wi-Fi passwords is covered in the paper.
Copyright: © the author(s), publisher and licensee Technoscience Academy. This is an open-access article distributed under the
terms of the Creative Commons Attribution Non-Commercial License, which permits unrestricted non-commercial use,
41
distribution, and reproduction in any medium, provided the original work is properly cited
Suthar Bhavik et al Int J Sci Res Sci Eng Technol, January-Febuary-2024, 11 (1) : 41-45
International Journal of Scientific Research in Science, Engineering and Technology | www.ijsrset.com | Vol 11 | Issue 1 42
Suthar Bhavik et al Int J Sci Res Sci Eng Technol, January-Febuary-2024, 11 (1) : 41-45
Attempt to exploit discovered vulnerabilities and Open the terminal in kali Linux and type the
weaknesses to gain access to the system or network. command hping3 –c 100000 –d 120 –S –w 64 –p 21 –
Utilize various methods such as password cracking, flood –rand-source (address of the target website) and
social engineering, or exploiting software press enter. In the above command meaning of
vulnerabilities. different parameters are as follows:- hpin3 is the name
of the application binary. –c 100000 is the number of
4. Maintaining Access: packets to send. –d 120 is the size of each packet that
is to be sent to target machine. –s means sending SYN
Once initial access is achieved, ethical hackers
packets only , –w 64 means the TCP window size , –p
attempt to maintain persistent access to the system to
21 is the destination port (21 being FTP port). You can
simulate the actions of a real attacker. Install
use any port here , –flood means sending packets as fast
backdoors or maintain control over the system to
as possible, without taking care to show incoming
demonstrate potential risks and the extent of a
replies , –rand-source means using Random Source IP
successful intrusion.
Addresses , After entering the previous the DoS attack
is started to see how the attack is working open a new
5. Clearing Tracks:
terminal and type tshark and press enter there you will
It is very important, after gaining access and misusing be able to see how packets are sent to the target. Now
the network, that the attacker cover the tracks to avoid to stop the attack press ctrl+c in the DoS attack
being traced and caught. To do this, the attacker clears terminal window. After that you will be able to see
all kinds of logs and malicious malware related to the how many packets are sent. Some of the tools used by
attack. the ethical hackers:
International Journal of Scientific Research in Science, Engineering and Technology | www.ijsrset.com | Vol 11 | Issue 1 43
Suthar Bhavik et al Int J Sci Res Sci Eng Technol, January-Febuary-2024, 11 (1) : 41-45
hand white hat hackers or ethical hackers, who tries Electron., 2014.
to maintain the security. As in the computer system,
hacking plays a vital role as it deals with both sides of Cite this article as :
being good or bad. Further, this paper tells about the
types, working, and various attacks performed by the Suthar Bhavik, Mansi Luhariya, Dr. Darshanaben
hackers. In conclusion, it must be said that Ethical Dipakkumar Pandya, Dr. Abhijeetsinh Jadeja,
Hacking is a tool which when properly utilized can "Unlocking Security : The World of Ethical Hacking ",
help in better understanding of the computer systems International Journal of Scientific Research in Science,
and improving the security techniques as well. Engineering and Technology (IJSRSET), Online ISSN :
2394-4099, Print ISSN : 2395-1990, Volume 11 Issue 1,
pp. 41-45, January-February 2024. Available at doi :
https://doi.org/10.32628/IJSRSET2310666
Journal URL : https://ijsrset.com/IJSRSET2310666
International Journal of Scientific Research in Science, Engineering and Technology | www.ijsrset.com | Vol 11 | Issue 1 44
Suthar Bhavik et al Int J Sci Res Sci Eng Technol, January-Febuary-2024, 11 (1) : 41-45
International Journal of Scientific Research in Science, Engineering and Technology | www.ijsrset.com | Vol 11 | Issue 1 45